Zero Trust Security systems, known by many as security infinity, which applies an approach to the design and implementation of IT systems. A trusted security model by eliminating trust, whose job is to prevent cyber attacks such as data leaks by eliminating the concept of “trust” from the company’s network architecture,
In 2018, US cybersecurity researchers at NIST and NCCoE published SP 800-207, Zero Trust Architecture. From that publication, Zero Trust is defined as a collection of concepts and ideas designed to reduce uncertainty in enforcing accurate access per request decisions on information systems and services to deal with networks that are deemed to have been hacked.
Zero Trust Security is a security system with an architectural model that is widely applied by various companies to strengthen their infrastructure.
Today, Zero Trust can mean many things to people. There are three principles that define Zero Trust Security.
First, can be a means of setting a posture for gaining access to applications and network resources (regardless of the source).
Second, serves as an architectural model for how companies manage elements in network, application, and identity environments to improve security posture through a “no trust by default” model.
Third, can be a context model to eliminate binary decision-making in providing application and service actions by considering access request conditions.
These principles apply to all entities that can threaten both internally and externally.
Why Zero Trust Security?
Zero Trust Security has proven to be more effective than traditional perimeter-based or secure zone-based models that have until recently been used as the basis for the concept of securing corporate assets. Many companies are still using the old concept. The old concept divides business perceptions into two zones: the internal zone or safe zone, which is considered the safest zone with a fairly high level of trust, and the external zone, known as the dangerous zone and full of cyber threats.
But ironically, it is precisely the internal zone that has been known as the safest zone that has received many cyber attacks. The potential for leakage of company data is not from external zones which in fact are controlled by the majority of hackers, but from the company’s employees themselves because their lack of knowledge of data security makes them vulnerable to various types of cyber threats.
We can see from this case that Zero Trust Security enterprise protection is important for companies because it is more modern and can adapt to increasingly complex IT environments ranging from remote security, protecting workers, devices, applications, and data wherever the company is located.
Anything behind a corporate firewall is not secure. Because it constantly verifies requests as if the request came from an open network. Therefore, Zero Trust Security emphasizes not to trust all types of requests, regardless of their origin.
Zero Trust Security will also authenticate, authorize and encrypt each request before granting permission. Not only that, but it also has the principle of rights and micro-segmentation to reduce the risk of intrusion on the network, as well as the intelligence and analysis used to respond to irregularities directly.
Zero Trust Security Framework
Zero Trust Security has a framework to make it well-managed for business security. The following is the framework contained in this security model
It is important to know who needs access and ensure a clear identity.
Requests related to data access to existing browsers and applications must be ensured from verified devices.
Protect data from unauthorized transfers by utilizing the auto-classification step and encryption process.
Application access and configuration must be secure with defined policies. Not only that but the behavior of the application must also be monitored to prevent it from suspected irregularities.
Perform infrastructure settings and configurations based on the best steps, especially in the security aspect.
Just because a device is used on an internal network, don’t let it be trusted. Encrypt internal communications and restrict access according to policy, and implement micro-segmentation and threat detection in real-time.